Главная
Study mode:
on
1
Intro
2
Agenda
3
Objectives
4
Current State of Affairs
5
Taint Analysis for Program Crashes
6
History and Lore
7
State Transition for Memory Corruption
8
Backward Taint Analysis
9
Forward Taint Analysis
10
Fake Memory Structure Sample
11
Implementation Details
12
Sample Analysis on dead bugs
13
Sample Analysis 1
14
Sample Analysis 2
15
Sample Analysis 3
16
Challenges & Limitations
Description:
Explore a comprehensive research presentation on determining the practical exploitability of software issues through crash analysis. Delve into a semi-automated crash analysis framework designed to augment researchers' efforts in triaging exploitability and impact of program crashes. Learn about the combination of backward and forward taint propagation systems, and how they integrate into a single framework that maps input areas influencing crashes and analyzes potential code execution capabilities. Discover the implementation of two functional tools, including DPTrace, and witness demonstrations using public vulnerabilities. Gain insights into the challenges faced by exploit writers and product security teams in the era of advanced fuzzing frameworks and modern protection mechanisms.

DPTrace - Dual Purpose Trace for Exploitability Analysis of Program Crashes

Black Hat
Add to list
0:00 / 0:00